LastPass was breached, what you should do now

You have probably heard about the LastPass breach that occurred in August of 2022. It seemed to be nothing to be concerned about on the surface. However, LastPass just released […]
5 Must Do’s For Microsoft 365

A question our team gets asked frequently is “Office 365 from Microsoft HIPAA compliant? The short answer is yes, it is compliant – BUT a mis-configured system can change that. […]
My Time With a Billionaire – Marcus Lemonis

Recently, I had the unique opportunity to fly down to Miami and meet with a billionaire. Yes, billionaire with a “B”. I am involved with a peer group of other […]
Russian Hacker Arrested For Colonial Pipeline Ransomware Attack

The Colonial Pipeline Attack happened back in May of 2021 and was a crippling attack for the east coast. The pipeline was shut down for a few days causing a […]
Top 10 Mistakes To Avoid When Choosing Your Next IT Consultant

From misleading information to unqualified technicians, poor management and terrible customer service, we’ve seen it all…and we know they exist in abundance because we have had a number of customers […]
Maximize your Microsoft Word subscription with these tips

Microsoft Word is synonymous with document processing, which isn’t a surprise given its ubiquity and reputation for being user-friendly. Yet, many users are still surprised to learn that it […]
Top tips when selecting an MSP for your business

Technology underpins nearly every aspect of modern business processes. Managing it, however, can be complex and tedious. This is where managed IT services providers (MSPs) can help. Whether your […]
Surefire ways to protect your email account

If you think your email is safe from hackers, think again. A lack of sufficient email security protocols can lead to data theft, unauthorized access to sensitive information, and successful […]
How Is the Cyber Attack On Bandwidth.com Affecting Your Business?

To understand what happened with Bandwidth.com and how your business may have been impacted, I would like to use an example to explain how a phone call happens. There is […]
Safeguard your mobile devices with these tips

Mobile devices are generally less secure than laptop and desktop computers. While there are available anti-malware applications for smartphones and tablets, they aren’t as comprehensive as those for laptops and […]